e-stox technical presentation
DESCRIPTION
Solution presented by me and my boss Syed Qutub Ahmed.TRANSCRIPT
Apv s onTap the undiscovered
Application & Network Communication
Agenda• Propose Network Communication
Options Between AMZ & Bank– Radio Connection– DXX– Via ITI
• Propose Application Communication Options Between eStox & Bank– Direct DB Access– Indirect Access Through Interfaces– Forced vs. Scheduled Communication
• Backup & Recovery Options
Enterprise Infrastructure
Setup
AMZ Central Operations
Overall Communication
Communication Via ITI
Communication Via Radios
Communication Via DXX
• Communication Via Application Middleware – Such As:– C/C++ or Java APIs– COM+/DCOM– .Net Remoting– Custom Interface
• Communication Via Database Middleware– Shared & Exposed Stored Procedures– Database Replication from Designated &
Authorized Tables• Direct Access to eStox Database
– Bank Pulls from eStox DB Directly– Not Real-Time– UBL’s Network Architecture May Not Allow
This Scheme
eStox – Bank Communication
eStox – Bank Communication
• Exclusive Database Backup Server• Daily Backups on Tape Drives at CoB• Automatic Takeover of DB Backup
Server upon Primary DB Server Failure• Real-Time & Active Database
Replication at DB Backup Server• Database to Restore Automatically Till
the Last Checkpoint in Case of a Disaster
Backup & Recovery
• Password Protected Application• Passwords Stored Only After Automatic
Encryption – No Clear-Text Passwords• Thorough QA & Testing
– User Interface Tests– Usability Tests– Stress Tests– Smoke Tests– SQL/Code Injection Attacks
• Database Accessible Only Via Authorized Roles• 128-Bit Security Certificates Incorporation
(Optional)• Hardware Key-Based Security (Optional)
– Barbed Wire (AMZ’s Partner for Security)• Data Encrypted During Transfers
Integrity & Security
• Anti-Virus Firewall (Optional – AMZ is a Solutions Partner of Symantec)
• Real-Time Compilation of Network, Application and Database Access Activities
• Complete Audit Trails & Modification Logs of User Activities
• Periodic Review of Access Logs & Active Identification & Resolution of Anomalies
• Software Firewall on Application & Database Servers (Optional)
Integrity & Security
• Database Server– Dell Server 2U/5U– Dual Power Supply– Intel Pentium 4 3.0
GHz– 1 GB RAM– 128 GB Dual Ultra
SCSI Data Storage with Mirroring
– MS Windows 2000/2003 Server
– MS SQL Server 2000
– .Net Framework
• Application Server– Dell Server 1U/2U– Dual Power Supply– Intel Pentium 4, 3.0
GHz– 512 MB RAM– 72 GB Dual Ultra
SCSI Data Storage with Mirroring
– MS Windows 2000/2003 Server
– .Net Framework
Infrastructure Requirements
• Workstations– Intel Pentium 4,
2.4 GHz– 256 MB RAM– 40 GB HDD– MS Windows 2000
Pro/XP– .Net Framework– SVGA Monitors
Supporting 1024x768 Resolution
• Database Backup Machine– Intel Pentium 4, 3.0
GHz– Tape Drive– Dual 120 GB ATA
7200 RPM HDDs– 512 MB RAM– Windows 2000/2003
Server– MS SQL Server 2000– .Net Framework– Event Scheduler
Infrastructure Requirements
• Internet Bandwidth for Online Customers: 128 Kbps (for launch), 256 Kbps (recommended), expandable as per requirements
Infrastructure Requirements
Database
• eStox is capable to work with any database, following RDBMS are tested and implemented with it already.– MS SQL Server 2000– MS SQL Server 2005– Oracle 8i– Oracle 9i– Oracle 10g– IBM DB2– Sybase Database
Development Tools
• eStox is developed using following development tools.
– C# .Net– ASP .Net– PHP 5.0– J2SE
Thank You
• Questions & Answers